Transcript
A (0:00)
Data weaponization, to me means the act of using data to manipulate, deceive, coerce, or attack someone, or otherwise inflict harm on them.
B (0:20)
Welcome to another episode of Data Security, decoded by Rubrik zero Labs. I'm your host Caleb Tolan, and in this episode I had the pleasure of sitting down with Pavlina Pavlova and an esteemed cybersecurity expert and policy advisor at institutions like the Cyberpeace Institute and the United Nations. Pavlina's expertise not only covers the technical aspect of cybersecurity, but also the intricate interplay of governance, security, and human rights within cybersecurity. I really enjoyed hearing Pavlina's insights into data weaponization and her ongoing efforts to address challenges facing organizations operating within critical infrastructure. Now, before we dive into the episode, if you're not subscribed to the podcast already, please do subscribe. Leave Leave us a review Leave us a comment all of that type of feedback really helps make sure that we're making this really valuable for you and be sure to subscribe so you don't miss the next episode. Thanks again and let's dive into the episode. Pavlina, thank you so much for spending some time with us. I am really excited to dive into this conversation and really where I'd love to start is I know a lot of your research focuses on data weaponization and its disproportionate impacts on vulnerable populations. To start, can you define what data weaponization is?
A (1:29)
First of all, thank you for having me on this podcast. It's a great pleasure to share about my research, so thank you for inviting me. And yeah, let's start with data weaponization. As I define it in my research, and I will speak about why it was important to take this very broad definition is that data weaponization to me means the act of using data to manipulate, deceive, coerce or attack someone or otherwise inflict harm on them. And this includes very many offenses in cyberspace such as data breaches and unauthorized access, but also authorized access. The authorization may be granted knowingly or under false pretenses, such as through social engineering techniques or other forms of manipulation. And additionally, data can be also extracted by coercing and intimidating the targets. And this includes, for example, non consensual sharing of intimate images. So you have a crime which deeply affects women and the photos can be shared at some moment but then disseminated non consensually. And this is also covered in the new UN Cybercrime Convention. And this includes also deep fakes so pictures which are available online or fed and publicly and fed into those AI image generators, but with impacts which are harmful to the targets. And it's important to have this broad definition because it can then capture the harms to women and men in distinct ways. And the key question for my research when I was compiling the report for New America was why the nature of an attack or its impact is gendered. So just because it happens to a woman, it doesn't make it gendered. But if a woman and a man with similar attack have different consequences, that makes the consequence gender. So the key question is why, if I'm a woman or a man or gender or sexual minority, it matters in the digital realm.
